• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

How to Create an IT Incident Response Plan

  • Written by: Trevor Meers
Laptop Incident Response Graphic

Recent high-profile IT outages and ransomware attacks have motivated many organizations to dust off their incident response plans—or create one for the first time. If you’ve ever endured a breach, you know the value of a well-designed incident response plan. By guiding decisions in the critical first hours of an incident, the incident response plan can keep a minor situation from turning into an operational shutdown, as well as help your team track down the breach’s root cause, file cyber insurance claims, manage messages to customers and more. 

A solid plan helps ensure that your crisis won’t ripple out to all of your clients and partners. A well-planned response prevents data loss, financial loss, impaired reputation and long-term damage to your business. Use the following guidelines to make sure you create an incident response plan that includes all the essentials. 

Check Your Industry’s Requirements 

Start by determining what others require of you. In many industry sectors, incident response (IR) plans are mandated by state law, federal guidelines (such as HIPAA) or your biggest customers’ vendor contracts. For example, more than a dozen states require any company in the insurance industry to maintain a written IR plan, among other best practices. And your cyber insurance underwriter will almost certainly offer you a better rate if you have policies such as an IR plan in place.  

Guides for Creating Your Plan 

One go-to standard for IR plans is NIST publication 800-61, known as the “Computer Incident Handling Guide.” This 79-page document provides details on tasks such as structuring an IR team, handling incidents as they occur and coordinating across departments and organizations. NIST’s approach boils down to this four-part Incident Response Life Cycle:  

You should also review the SANS Institute’s more concise guide, known as the Incident Handlers Handbook. SANS recommends that every plan provide a specific process for these six areas: 

  • Preparation 
  • Identification 
  • Containment 
  • Eradication 
  • Recovery 
  • Lessons Learned 

Where to Start Your Plan 

Begin by asking these critical questions about your business: 

  • Who are the critical staff? 
  • What resources are available? 
  • Who are the primary and secondary contacts? 
  • What is the backup process? 
  • How quickly would you recover from an incident? 
  • How could an incident impact future business? 

Before implementing an IR plan, let your staff know so they can understand why you’re writing the plan and what their role will be during an incident. Include pertinent staff members in creation of the plan so that they’re invested in executing the plan when an incident comes up. 

What to Put In Your Plan 

These are the key elements to include in your IR plan: 

  • Your definition of an “incident” – This determines what triggers your IR plan. Typical situations that constitute incidents are loss or accidental disclosure of sensitive info, an intrusion or attack on the network or the discovery of a vulnerability that could affect operations. Vague definitions of incidents can trigger unnecessary IR responses even for low-level situations. 
  • IR team structure – The team’s size depends on your organization’s size and complexity. The team plan should include: 

– An incident coordinator tasked with managing meetings, keeping notes and documenting actions. 

– People with strong tech skills, IR experience and an understanding of the business. 

– Multiple people with strong communications skills they can use to share information clearly and efficiently in the right directions. 

– Representation from key related areas such as legal, HR, and the physical facilities team. 

– An executive sponsor who can champion the team’s concerns up the ladder and provide visibility to the overall business. 

– A system for rotating IR team members on a planned basis to avoid burnout and promote fresh perspectives. 

  • Roles/responsibilities – Clearly outline exactly who does what and establish a clear team leader. Some states’ regulations for certain industries require companies to officially report the name of the person of contact (POC) for information security. Be sure to consider duties your IR team may have in non-emergencies, such as training employees, monitoring threat alerts and participating in relevant industry groups. 
  • Incident-reporting procedure – The team’s ability to respond effectively relies on finding out about the incident in a clear, timely manner. Describe whether notifications should take place through a help desk ticket, e-mail, phone call, etc. The plan should also specify procedures for preserving potential evidence. Your company’s ongoing security training should cover the incident-reporting procedure. 
  • Communications plan for outside entities – You will probably need to notify people beyond your company war room about incidents. A chart like the one below from NIST shows the variety of parties with which you may need to interact. In your plan, establish clear rules of communication. Sharing the wrong information at the wrong time with the wrong entity could have implications for your cyber insurance, breach notification liabilities, class action suits, breach of contract claims and more. 

Incident Response Team Web

  • Post-event reporting – After the situation is resolved, the team should issue a report summarizing what happened and what remediations are required. Your plan should provide specifics on who will compile that report and the leaders who get a copy. Go over questions like, what went wrong? What went right? You should also establish a timeline of events to help answer these questions and see the bigger picture. 

It’s easy for IR plans to get very long and complex, especially as you continue to revise it over the years. But you should focus on streamlining your plan to the essentials that people can realistically follow in the excitement and confusion of a real incident. 

Building Your External Team 

Just as critical as your organization’s internal team is the lineup of external service providers you’ll call on in an emergency. It’s essential to identify and build relationships with your providers in advance for two reasons. First, service providers that get to know your organization in normal times will be prepared to spring into action with an informed point of view at a moment’s notice. Second, securing the providers ahead of time will help you use your preferred vendors rather than being stuck with an unknown company from your cyber insurance carrier’s preferred provider list. Once you’ve picked a vendor, ask your cyber insurance company to add them to the preferred list to ensure that you get to work with your selected partners. 

Your external vendor team should include: 

  • An attorney with cyber expertise 
  • A digital forensics team 
  • A breach coach 
  • Cyber insurance contact 
  • Public relations firm, if your industry is in the public eye 

Test Your Plan 

Your IR plan isn’t a set-it-and-forget-it proposition. You won’t know if it works unless you test it. And you won’t know if it continues to work unless you incorporate a specific, regular schedule for review. At minimum, review it once a year. If your business is highly dynamic, it may require more frequent review. Common changes that prompt plan updates include: 

  • Changing personnel on the IR team 
  • Implementing new technology platforms 
  • Winning contracts with new clients 
  • Entering new geographic or industry markets with different requirements 
  • Increasing budgets that expand your resources 

Review the Aftermath 

After you experience an actual incident and contain the problem, the IR plan should include steps for reviewing the incident. Ask what went right and what went wrong. Establish a timeline of events to help answer these questions and show you the bigger picture. 

After the review, adjust your plan as needed. If a step in the process didn’t go as planned, figure out why and make changes. 

If you need help creating an IR plan tailored for your specific situation, contact HBS today. 

Related Content

Incident Response Testing Levels Graphic

How to Test Your Cybersecurity Incident Response Plan

Here’s how to choose the right test in order to confirm that your cybersecurity incident response plan actually works like you think it will.

Learn More »
image of hands crossing off a checklist with the words Incident Response Planning

Creating an Incident Response Plan

Creating an incident response plan is critical for the stability of any organization, and setting one up does not have to be stressful with these tips.

Explore More »
Incident Response Tabletop Exercise Scenarios

Incident Response Tabletop Exercise and Scenarios

Enhance your cybersecurity with our realistic tabletop exercises. Practice incident response and identify plan changes with our sample scenarios.

Read More »
  • Business Continuity, Incident Response, IT Leadership, NIST, Policies
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2025 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.